If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.

When you connect to your ISP, you are potentially opening your computer to the world. There are \'naughty people\' out there who enjoy breaking into other people\'s computers. Give some thought to the security of your computer... http://www.AntiOnline.com/sig.php?imageid=360

Unless you steal a network map from the WAN group, scanning is the best way to discover boxes.

The way I would do it is with NMAP. It will scan an entire network and guess at the OS of every machine that it hits. Grab yourself a Linux box or get NMAP for Windows and plug away. Note that you will need libpcap installed *before* you can use NMAP for windows. You can get everything you need from here:http://www.insecure.org/nmap/nmap_download.html

Specifiying ports assumes that you are looking for a particular service, not just if the server is alive. 8080 is a popular proxy port. Are you looking for parimeter machines? Remote Webserver Management Consoles?

Hope this helps out.

Our scars have the power to remind us that our past was real. -- Hannibal Lecter.
Talent is God given. Be humble. Fame is man-given. Be grateful. Conceit is self-given. Be careful. -- John Wooden

Depends really, MOST networks these days are setup with a DMZ. A Demilitarized Zone (DMZ) is used by a company that wants to host its own Internet services without sacrificing unauthorized access to its private network. The DMZ sits between the Internet and an internal network's line of defense, usually some combination of firewalls and bastion hosts.
Typically, the DMZ contains devices accessible to Internet traffic, such as Web (HTTP ) servers, FTP servers, SMTP (e-mail) servers and DNS servers.

So basically, IF a network has DMZ set up, all you get is the DMZ network. not the whole network. i have set up networks myself and i do recomend putting in a DMZ coz it always works. THE only way u can bypass a DMZ is by accuiring the routing tables.

one of the nice way to network map a site would be to use a tool like etherape and view the actual protocal transversing across the network, since you know that only specific port and protocol would run from the server. even this is still a long shot since many honeynets could spoof this as well.